US20170286321A1 - Dual-system-based data storage method and terminal - Google Patents

Dual-system-based data storage method and terminal Download PDF

Info

Publication number
US20170286321A1
US20170286321A1 US15/495,015 US201715495015A US2017286321A1 US 20170286321 A1 US20170286321 A1 US 20170286321A1 US 201715495015 A US201715495015 A US 201715495015A US 2017286321 A1 US2017286321 A1 US 2017286321A1
Authority
US
United States
Prior art keywords
data
storing
important
dual
judged
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US15/495,015
Other versions
US10204061B2 (en
Inventor
Shuang LIAN
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Assigned to YULONG COMPUTER TELECOMMUNICATION SCIENTIFIC (SHENZHEN) CO., LTD. reassignment YULONG COMPUTER TELECOMMUNICATION SCIENTIFIC (SHENZHEN) CO., LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: LIAN, Shuang
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Publication of US20170286321A1 publication Critical patent/US20170286321A1/en
Application granted granted Critical
Publication of US10204061B2 publication Critical patent/US10204061B2/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1416Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1408Protection against unauthorised use of memory or access to memory by using cryptography
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1458Protection against unauthorised use of memory or access to memory by checking the subject access rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2212/00Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
    • G06F2212/10Providing a specific technical effect
    • G06F2212/1052Security improvement
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2212/00Indexing scheme relating to accessing, addressing or allocation within memory systems or architectures
    • G06F2212/40Specific encoding of data in memory or cache
    • G06F2212/402Encrypted data

Definitions

  • the present invention relates to the technical field of communication, and in particular relates to a dual-system-based data storage method and terminal.
  • a dual-system mode of a communication terminal refers to that two independent operating systems, including a first system and a second system, can be mounted in a communication terminal such as a cell phone, wherein a user processes important data in the second system, and processes ordinary data in the first system.
  • the second system is different from a private application program, because a private application program is just a safe application program, and the second system adopts system-level partition and isolation with even better safety.
  • the first system and the second system run concurrently, and the user can choose to enter one of these operating systems, so that data is directly stored into the chosen system where the user handles the data. For example, when the user handles certain data in the second system, the data is automatically stored into the second system and cannot be accessed or processed in the first system. But the user might also handle important data in the first system, and if this important data is automatically stored into the open first system alike, then privacy content of the user easily gets leaked.
  • an objective of the present invention is to provide a dual-system-based data storage method and terminal, so that in a dual-system environment the important data handled by a user in a first system can be quickly and conveniently stored into a second system, thereby sufficiently protecting information security for the user.
  • the present invention provides a dual-system-based data storage method that comprises the steps of judging whether the data is important data when storing data in a first system; and storing the data into a second system if it is judged that the data is important data.
  • the method before judging whether the data is important data when storing data in the first system, the method further comprises judging the current system environment when storing the data; directly storing the data into the second system if it is judged that the current system environment is the second system, or performing the step of judging whether the data is important data if it is judged that the current system environment is the first system.
  • switch entries are provided for the first system and the second system, the second system can be entered from the first system after receiving a correct password, and the first system can be entered from the second system without password.
  • the data stored in the second system can be imported into the first system in an encrypted backup form.
  • the second system is a non-open operating system.
  • the step of judging whether the data is important data comprises analyzing the data to determine whether a prescribed keyword is included in the data; and judging the data to be important data if it is determined that the prescribed keyword is included in the data.
  • the step of judging whether the data is important data comprises analyzing the data to determine whether the data belongs to a prescribed data type; and judging the data to be important data if it is determined that the data belongs to the prescribed data type.
  • the step of storing the data into a second system if it is judged that the data is important data comprises generating a storing prompt that suggests a user to store the data into the second system if it is judged that the data is important data; displaying an authentication interface of the second system after receiving a confirmation instruction of storing the data into the second system; and storing the data into the second system after correct authentication information is received by the authentication interface.
  • the method further comprises sending a command to store the data into the first system according to a received cancel instruction for cancelling storing the data into the second system.
  • the method further comprises sending a command to store the data into the first system after incorrect authentication information is received by the authentication interface.
  • the present invention also provides a terminal for dual-system-based data storage that comprises a communication bus, a transceiver, a memory and a processor, wherein, the communication bus communicably interconnects the transceiver, the memory and the processor, the processor stores program codes, and execution of the program codes by the processor causes the processor to judge whether the data is important data when storing data in a first system; and store the data into a second system if it is judged that the data is important data.
  • the processor before judging whether the data is important data when storing data in the first system, the processor is further caused to judge the current system environment when storing the data; judge whether the data is important data according to a preset rule if it is judged that the current system environment is the first system; directly store the data into the second system if it is judged that the current system environment is the second system.
  • said judging whether the data is important data comprises analyzing the data to determine whether a prescribed keyword is included in the data; and judging the data to be important data if it is determined that the prescribed keyword is included in the data.
  • said judging whether the data is important data comprises analyzing the data to determine whether the data belongs to a prescribed data type; and judging the data to be important data if it is determined that the data belongs to the prescribed data type.
  • said storing the data into a second system if it is judged that the data is important data comprises generating a storing prompt that suggests a user to store the data into the second system if it is judged that the data is important data; displaying an authentication interface of the second system after receiving a confirmation instruction of storing the data into the second system; and storing the data into the second system after correct authentication information is received by the authentication interface.
  • the processor after generating the storing prompt, is further caused to send a command to store the data into the first system according to a received cancel instruction for cancelling storing the data into the second system.
  • the processor is further caused to send a command to store the data into the first system after incorrect authentication information is received by the authentication interface.
  • the communication terminal of the present invention when a user handles and stores data in the first system, if it is judged that the data is important data, said data is stored into the second system; and if the user handles and stores data in the second system, said data is stored directly into the second system.
  • the present invention can store the important data handled by the user in the first system into a second system quickly and conveniently, thereby sufficiently protecting information security for the user.
  • FIG. 1 is a structural schematic diagram of a dual-system-based data storage apparatus of the present invention
  • FIG. 2 is a structural schematic diagram of a dual-system-based data storage apparatus of a preferable embodiment of the present invention
  • FIG. 3 is a flow chart of a dual-system-based data storage method of the present invention.
  • FIG. 4 is a flow chart of a dual-system-based data storage method of a preferable embodiment of the present invention.
  • FIGS. 5A-5C are operation interface views of the dual-system-based data storage method of a preferable embodiment of the present invention.
  • FIG. 6 is a structural schematic diagram of a terminal for dual-system-based data storage of the present invention.
  • FIG. 1 is a structural schematic diagram of a dual-system-based data storage system of the present invention.
  • the data storage system 100 can be applied on a communication terminal such as a cell phone, a PDA (Personal Digital Assistant) or a tablet computer.
  • This communication terminal is simultaneously installed with a first system and a second system that are independent from each other.
  • the first system is preferably an open operating system, such as Android operating system or IOS (Apple's operating system), and a user can handle ordinary data in the first system.
  • the second system is preferably a non-open operating system, such as an operating system independently developed by the terminal manufacturer, and the user can handle important data such as privacy data in the second system.
  • the data storage system 100 comprises a data judging module 10 and a storage control module 20 , wherein:
  • the data judging module 10 is for judging whether the data is important data when storing data in the first system.
  • the data judging module 10 analyzes the data to determine whether a prescribed keyword is included in the data, in particular, the data is scanned to determine whether it involves a bank account, a password, a credential picture, a certificate photo, etc., and if the data includes any prescribed keyword, the data judging module 10 judges the data to be important data.
  • the data judging module 10 analyzes the data to determine whether the data belongs to a prescribed data type, in particular, the prescribed data type may be a picture type, a video type, a text document type, etc., and if the data belongs to the prescribed data type, the data judging module 10 judges the data to be important data.
  • the storage control module 20 is for storing the data into the second system if it is judged that the data is important data. For example, when a dual-system-based communication terminal processes and stores data such as a short message, a picture, a calendar, an audio recording, etc., firstly, the system environment that the user is currently in is judged, if the user is currently in the second system, the data processed in the second system is then directly stored into the second system; if the user is currently in the open first system, the data that is prepared to be stored is then judged according to a preset rule (i.e., keyword characteristic) to determine whether it is important data, and if the data is judged to be important data, it is then stored into the second system.
  • a preset rule i.e., keyword characteristic
  • the data stored in the second system can be imported into the first system in an encrypted backup form, and the user needs to know a correct password in order to retrieve the data.
  • the present invention mainly solves the problem of secured data storage in an open first system, in a dual-system-based environment, the system environment that a user is currently in is judged, so that the user can quickly saves important data such as privacy data in to a second system, thereby effectively protecting the privacy content for the user.
  • FIG. 2 is a structural schematic diagram of a dual-system-based data storage apparatus of a preferable embodiment of the present invention.
  • the data storage system 100 can be applied on a communication terminal such as a cell phone, a PDA or a tablet computer. This communication terminal is simultaneously installed with a first system and a second system that are independent from each other.
  • the first system is preferably an open operating system, such as Android or IOS, and a user can handle ordinary data in the first system.
  • the second system is preferably a non-open operating system, such as an operating system independently developed by the terminal manufacturer, and the user can handle important data such as privacy data in the second system.
  • the data storage system 100 comprises a data judging module 10 , a storage control module 20 and a system judging module 30 , wherein:
  • the system judging module 30 is for judging the current system environment when storing the data, said system environment can be a first system or a second system. If the current system environment is the second system, the data is then directly stored into the second system.
  • the data judging module 10 judges whether the data is important data.
  • the data judging module 10 further comprises:
  • a first analyzing sub-module 11 for analyzing the data to determine whether a prescribed keyword is included in the data.
  • the data is scanned to determine whether it involves a bank account, a password, a credential picture, a certificate photo, etc.
  • a first judging sub-module 12 for judging the data to be important data if it is determined that the prescribed keyword is included in the data.
  • a second analyzing sub-module 13 for analyzing the data to determine whether the data belongs to a prescribed data type.
  • the prescribed data type may be a picture type, a video type, a text document type, etc.
  • a second judging sub-module 14 for judging the data to be important data if it is determined that the data belongs to the prescribed data type.
  • the storage control module 20 directly stores the data into the second system; if the current system environment is the first system and the data is important data, the storage control module 20 also stores the data into the second system.
  • the storage control module 20 comprises:
  • a storage prompting sub-module 21 for generating a storing prompt that suggests a user to store the data into the second system if it is judged that the data is important data.
  • the storing prompt can be implemented by using a text, a picture, an audio or a video to prompt the user that the data is important data and is suggested to be stored into the second system.
  • the storing prompt can be provided with a confirmation button and a cancel button, and after the user receives the storing prompt, the user may click on the confirmation button to send a confirmation instruction, and may also click on the cancel button to send a cancel instruction. If the cancel instruction is sent, the data is then directly stored into the first system.
  • an interface displaying sub-module 22 for displaying an authentication interface of the second system after receiving the confirmation instruction of storing the data into the second system.
  • a password input box may be displayed on the authentication interface, so as to require the user to input a correct authentication password.
  • a storage control sub-module 23 for storing the data into the second system after correct authentication information is received by the authentication interface.
  • the authentication interface Preferably, if the user has input a correct authentication password on the authentication interface, the authentication is successfully completed and then the data is stored into the second system.
  • the user may also input a correct authentication gesture on the authentication interface to complete the authentication operation.
  • the user's important data can be quickly stored into the second system. If the user is currently in the second system, the data handled by the user is directly stored into the second system; if the user is currently in the open first system, the data is judged to determine whether it involves important data, and if it is the case, the user is prompted to store the data into the second system, so that secured storage of important data is quickly realized, thereby protecting personal important data information.
  • FIG. 3 is a flow chart of a dual-system-based data storage method of the present invention, which can be carried out by the data storage system 100 shown in FIG. 1 or FIG. 2 , comprising the steps of:
  • Step S 301 judging whether the data is important data when storing data in a first system.
  • the data is analyzed to determine whether a prescribed keyword is included in the data, for example, the data is scanned to determine whether it involves a bank account, a password, a credential picture, a certificate photo, etc., and if the data includes any prescribed keyword, it is judged that the data is important data.
  • the data is analyzed to determine whether the data belongs to a prescribed data type, in particular, the prescribed data type may be a picture type, a video type, a text document type, etc., and if the data belongs to the prescribed data type, it is judged that the data is important data.
  • Step S 302 storing the data into a second system if it is judged that the data is important data.
  • a dual-system-based communication terminal processes and stores data such as a short message, a picture, a calendar, an audio recording, etc.
  • the system environment that the user is currently in is judged, if the user is currently in the second system, the data processed in the second system is then directly stored into the second system; if the user is currently in the open first system, the data that is prepared to be stored is then judged according to a preset rule (i.e., keyword characteristic) to determine whether it is important data, and if the data is judged to be important data, it is then stored into the second system.
  • a preset rule i.e., keyword characteristic
  • the data stored in the second system can be imported into the first system in an encrypted backup form, and the user needs to know a correct password in order to retrieve the data.
  • FIG. 4 is a flow chart of a dual-system-based data storage method of a preferable embodiment of the present invention, which can be carried out by the data storage system 100 shown in FIG. 2 , comprising the steps of:
  • Step S 400 processing data when two operating systems are running concurrently.
  • Step S 401 judging the current system environment when storing the data.
  • Said system environment may be a first system or a second system.
  • Step S 402 if the system environment is the second system, directly storing the data into the second system.
  • Step S 403 if the current system environment is the first system, judging whether the data is important data. If the data is judged to be important data, Step S 405 is executed; otherwise, Step S 404 is executed.
  • the data is analyzed to determine whether a prescribed keyword is included in the data, for example, the data is scanned to determine whether it involves a bank account, a password, a credential picture, a certificate photo, etc., and if the data includes any prescribed keyword, it is judged that the data is important data.
  • the data is analyzed to determine whether the data belongs to a prescribed data type, in particular, the prescribed data type may be a picture type, a video type, a text document type, etc., and if the data belongs to the prescribed data type, it is judged that the data is important data.
  • Step S 404 if it is judged that the data is not important data, storing the data into the first system.
  • Step S 405 if it is judged that the data is important data, generating a storing prompt that suggests the user to store the data into the second system.
  • the storing prompt can be implemented by using a text, a picture, an audio or a video to prompt the user that the data is important data and is suggested to be stored into the second system.
  • Step S 406 judging whether a confirmation instruction of storing the data into the second system is received. If it is the case, Step S 407 is executed; otherwise, Step S 404 is executed.
  • the storing prompt can be provided with a confirmation button and a cancel button, and after the user receives the storing prompt, the user may click on the confirmation button to send a confirmation instruction, and may also click on the cancel button to send a cancel instruction. If the cancel instruction is sent, the data is then directly stored into the first system.
  • Step S 407 displaying an authentication interface of the second system after receiving a confirmation instruction of storing the data into the second system.
  • a password input box may be displayed on the authentication interface, so as to require the user to input a correct authentication password.
  • Step S 408 judging whether correct authentication information is received by the authentication interface. If it is the case, Step S 409 is executed; otherwise, Step S 410 is executed.
  • Step S 409 storing the data into the second system after correct authentication information is received by the authentication interface.
  • the authentication is successfully completed and then the data is stored into the second system.
  • the user may also input a correct authentication gesture on the authentication interface to complete the authentication operation.
  • Step S 410 if no correct authentication information is received by the authentication interface, prompting authentication error. Then the data is stored into the first system by default.
  • FIGS. 5A-5C are operation interface views of the dual-system-based data storage method of a preferable embodiment of the present invention.
  • a user stores data such as a text document, an audio recording, a picture, a short message or a calendar in a communication terminal
  • the system environment that the user is currently in is judged, if the current system environment is the second system, the data such as the text document, the audio recording, the picture, the short message or the calendar is then directly stored into the second system, and the user can only access and handle this data in the second system;
  • the current system environment is the first system, the data is then judged to determine whether it involves a prescribed keyword such as a bank account, a password, a credential picture or a certificate photo, and if it is the case, the data is then judged to be important data.
  • a scanned ID (Identification) card picture is generated after a user scans an ID card
  • the system recognizes that this scanned ID card prescribed keyword includes the prescribed keyword of an ID card number corresponding to the ID card, and prompts the user that this data involves privacy information if credentials and that it is suggested to save this data into the second system, as shown in FIG. 5B , if the user clicks on the OK button, it means the user agrees to save the data into the second system; if the user clicks on the Cancel button, the data is then stored into the first system. If the user clicks on the OK button, a password authentication interface for the second system is then popped, as shown in FIG. 5C , which prompts the user to input an authentication password for the second system in the password input box, and if the user has input a correct authentication password, the data is then automatically stored into the second system.
  • FIG. 6 is a structural schematic diagram of a terminal for dual-system-based data storage of the present invention.
  • the terminal for dual-system-based data storage comprises a communication bus 600 , a transceiver 601 , a memory 602 and a processor 603 (the data storage terminal may have one or more processors 603 , and FIG. 6 shows one processor for example), wherein:
  • the communication bus 600 communicably interconnects the transceiver 601 , the memory 602 and the processor 603 .
  • the processor 603 stores program codes, and execution of the program codes by the processor 603 causes the processor 603 to perform the following operation steps:
  • the processor 603 judges whether the data is important data when storing data in a first system
  • the processor 603 stores the data into a second system if it is judged that the data is important data.
  • the processor 603 judges whether the data is important data when storing data in the first system, the processor 603 is also caused to perform the following operation steps:
  • the processor 603 judging whether the data is important data comprises:
  • the processor 603 storing the data into a second system if it is judged that the data is important data comprises:
  • a communication terminal of the present invention with two systems running concurrently, when a user handles and stores data in the first system, if it is judged that the data is important data, said data is stored into the second system; and if the user handles and stores data in the second system, said data is stored directly into the second system.
  • the present invention can store the important data handled by the user in the first system into a second system quickly and conveniently, thereby sufficiently protecting information security for the user.
  • the present invention may also have various other embodiments, and under the condition of not deviating from the concept and essence of the present invention, those familiar with the art can make various changes and modifications on the basis of the present invention, and these corresponding changes and modifications should be embraced in the protection scope defined by the appended claims of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Mathematical Physics (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

A dual-system-based data storage method, comprising the steps of (S301) judging whether the data is important data when storing data in a first system; and (S302) storing the data into a second system if it is judged that the data is important data. Thus, in a dual-system environment, the important data handled by a user in a first system can be quickly and conveniently stored into a second system, thereby sufficiently protecting information security for the user.

Description

    CROSS REFERENCE
  • The present application is a continuation application of PCT international application No. PCT/CN2015/085886, the entire content of this PCT international application is incorporated herein by reference.
  • TECHNICAL FIELD
  • The present invention relates to the technical field of communication, and in particular relates to a dual-system-based data storage method and terminal.
  • BACKGROUND
  • A dual-system mode of a communication terminal refers to that two independent operating systems, including a first system and a second system, can be mounted in a communication terminal such as a cell phone, wherein a user processes important data in the second system, and processes ordinary data in the first system. The second system is different from a private application program, because a private application program is just a safe application program, and the second system adopts system-level partition and isolation with even better safety. The first system and the second system run concurrently, and the user can choose to enter one of these operating systems, so that data is directly stored into the chosen system where the user handles the data. For example, when the user handles certain data in the second system, the data is automatically stored into the second system and cannot be accessed or processed in the first system. But the user might also handle important data in the first system, and if this important data is automatically stored into the open first system alike, then privacy content of the user easily gets leaked.
  • To sum up, the prior art in practical use apparently has inconveniency and defects, and it is therefore necessary to improve the prior art.
  • SUMMARY OF THE INVENTION
  • In consideration of the above-mentioned defects, an objective of the present invention is to provide a dual-system-based data storage method and terminal, so that in a dual-system environment the important data handled by a user in a first system can be quickly and conveniently stored into a second system, thereby sufficiently protecting information security for the user.
  • In order to realize the above-mentioned objective, the present invention provides a dual-system-based data storage method that comprises the steps of judging whether the data is important data when storing data in a first system; and storing the data into a second system if it is judged that the data is important data.
  • In the data storage method of the present invention, before judging whether the data is important data when storing data in the first system, the method further comprises judging the current system environment when storing the data; directly storing the data into the second system if it is judged that the current system environment is the second system, or performing the step of judging whether the data is important data if it is judged that the current system environment is the first system.
  • In the data storage method of the present invention, switch entries are provided for the first system and the second system, the second system can be entered from the first system after receiving a correct password, and the first system can be entered from the second system without password.
  • In the data storage method of the present invention, the data stored in the second system can be imported into the first system in an encrypted backup form.
  • In the data storage method of the present invention, the second system is a non-open operating system.
  • In the data storage method of the present invention, the step of judging whether the data is important data comprises analyzing the data to determine whether a prescribed keyword is included in the data; and judging the data to be important data if it is determined that the prescribed keyword is included in the data.
  • In the data storage method of the present invention, the step of judging whether the data is important data comprises analyzing the data to determine whether the data belongs to a prescribed data type; and judging the data to be important data if it is determined that the data belongs to the prescribed data type.
  • In the data storage method of the present invention, the step of storing the data into a second system if it is judged that the data is important data comprises generating a storing prompt that suggests a user to store the data into the second system if it is judged that the data is important data; displaying an authentication interface of the second system after receiving a confirmation instruction of storing the data into the second system; and storing the data into the second system after correct authentication information is received by the authentication interface.
  • In the data storage method of the present invention, after generating the storing prompt, the method further comprises sending a command to store the data into the first system according to a received cancel instruction for cancelling storing the data into the second system.
  • In the data storage method of the present invention, the method further comprises sending a command to store the data into the first system after incorrect authentication information is received by the authentication interface.
  • The present invention also provides a terminal for dual-system-based data storage that comprises a communication bus, a transceiver, a memory and a processor, wherein, the communication bus communicably interconnects the transceiver, the memory and the processor, the processor stores program codes, and execution of the program codes by the processor causes the processor to judge whether the data is important data when storing data in a first system; and store the data into a second system if it is judged that the data is important data.
  • In the terminal for data storage of the present invention, before judging whether the data is important data when storing data in the first system, the processor is further caused to judge the current system environment when storing the data; judge whether the data is important data according to a preset rule if it is judged that the current system environment is the first system; directly store the data into the second system if it is judged that the current system environment is the second system.
  • In the terminal for data storage of the present invention, said judging whether the data is important data comprises analyzing the data to determine whether a prescribed keyword is included in the data; and judging the data to be important data if it is determined that the prescribed keyword is included in the data.
  • In the terminal for data storage of the present invention, said judging whether the data is important data comprises analyzing the data to determine whether the data belongs to a prescribed data type; and judging the data to be important data if it is determined that the data belongs to the prescribed data type.
  • In the terminal for data storage of the present invention, said storing the data into a second system if it is judged that the data is important data comprises generating a storing prompt that suggests a user to store the data into the second system if it is judged that the data is important data; displaying an authentication interface of the second system after receiving a confirmation instruction of storing the data into the second system; and storing the data into the second system after correct authentication information is received by the authentication interface.
  • In the terminal for data storage of the present invention, after generating the storing prompt, the processor is further caused to send a command to store the data into the first system according to a received cancel instruction for cancelling storing the data into the second system.
  • In the terminal for data storage of the present invention, the processor is further caused to send a command to store the data into the first system after incorrect authentication information is received by the authentication interface.
  • By means of the communication terminal of the present invention, when a user handles and stores data in the first system, if it is judged that the data is important data, said data is stored into the second system; and if the user handles and stores data in the second system, said data is stored directly into the second system. As a result, in a dual-system environment, the present invention can store the important data handled by the user in the first system into a second system quickly and conveniently, thereby sufficiently protecting information security for the user.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a structural schematic diagram of a dual-system-based data storage apparatus of the present invention;
  • FIG. 2 is a structural schematic diagram of a dual-system-based data storage apparatus of a preferable embodiment of the present invention;
  • FIG. 3 is a flow chart of a dual-system-based data storage method of the present invention;
  • FIG. 4 is a flow chart of a dual-system-based data storage method of a preferable embodiment of the present invention;
  • FIGS. 5A-5C are operation interface views of the dual-system-based data storage method of a preferable embodiment of the present invention;
  • FIG. 6 is a structural schematic diagram of a terminal for dual-system-based data storage of the present invention.
  • DETAILED DESCRIPTION OF EMBODIMENTS
  • In order for the objectives, features and advantages of the present invention to be more clearly understood, hereinafter, detailed description of the present invention is further provided in combination with the accompanying drawings and specific embodiments. It should be understood that, the specific embodiments described herein is merely for explaining the present invention, and is not intended to limit the present invention.
  • FIG. 1 is a structural schematic diagram of a dual-system-based data storage system of the present invention. The data storage system 100 can be applied on a communication terminal such as a cell phone, a PDA (Personal Digital Assistant) or a tablet computer. This communication terminal is simultaneously installed with a first system and a second system that are independent from each other. The first system is preferably an open operating system, such as Android operating system or IOS (Apple's operating system), and a user can handle ordinary data in the first system. The second system is preferably a non-open operating system, such as an operating system independently developed by the terminal manufacturer, and the user can handle important data such as privacy data in the second system. Switch entries are provided respectively for the first system and the second system, the user can enter the second system from the first system after inputting a correct password, and the user can enter the first system from the second system without being required to input password. And, the data storage system 100 comprises a data judging module 10 and a storage control module 20, wherein:
  • The data judging module 10 is for judging whether the data is important data when storing data in the first system.
  • Preferably, the data judging module 10 analyzes the data to determine whether a prescribed keyword is included in the data, in particular, the data is scanned to determine whether it involves a bank account, a password, a credential picture, a certificate photo, etc., and if the data includes any prescribed keyword, the data judging module 10 judges the data to be important data. Alternatively, the data judging module 10 analyzes the data to determine whether the data belongs to a prescribed data type, in particular, the prescribed data type may be a picture type, a video type, a text document type, etc., and if the data belongs to the prescribed data type, the data judging module 10 judges the data to be important data.
  • The storage control module 20 is for storing the data into the second system if it is judged that the data is important data. For example, when a dual-system-based communication terminal processes and stores data such as a short message, a picture, a calendar, an audio recording, etc., firstly, the system environment that the user is currently in is judged, if the user is currently in the second system, the data processed in the second system is then directly stored into the second system; if the user is currently in the open first system, the data that is prepared to be stored is then judged according to a preset rule (i.e., keyword characteristic) to determine whether it is important data, and if the data is judged to be important data, it is then stored into the second system. Once the data is stored into the second system, the user would not be able to access or handle the data in the system environment of the first system, and therefore the security of important data is ensured. Preferably, the data stored in the second system can be imported into the first system in an encrypted backup form, and the user needs to know a correct password in order to retrieve the data.
  • The present invention mainly solves the problem of secured data storage in an open first system, in a dual-system-based environment, the system environment that a user is currently in is judged, so that the user can quickly saves important data such as privacy data in to a second system, thereby effectively protecting the privacy content for the user.
  • FIG. 2 is a structural schematic diagram of a dual-system-based data storage apparatus of a preferable embodiment of the present invention. The data storage system 100 can be applied on a communication terminal such as a cell phone, a PDA or a tablet computer. This communication terminal is simultaneously installed with a first system and a second system that are independent from each other. The first system is preferably an open operating system, such as Android or IOS, and a user can handle ordinary data in the first system. The second system is preferably a non-open operating system, such as an operating system independently developed by the terminal manufacturer, and the user can handle important data such as privacy data in the second system. And, the data storage system 100 comprises a data judging module 10, a storage control module 20 and a system judging module 30, wherein:
  • The system judging module 30 is for judging the current system environment when storing the data, said system environment can be a first system or a second system. If the current system environment is the second system, the data is then directly stored into the second system.
  • If the current system environment is the first system, the data judging module 10 judges whether the data is important data. The data judging module 10 further comprises:
  • a first analyzing sub-module 11 for analyzing the data to determine whether a prescribed keyword is included in the data. In particular, the data is scanned to determine whether it involves a bank account, a password, a credential picture, a certificate photo, etc.
  • a first judging sub-module 12 for judging the data to be important data if it is determined that the prescribed keyword is included in the data.
  • a second analyzing sub-module 13 for analyzing the data to determine whether the data belongs to a prescribed data type. In particular, the prescribed data type may be a picture type, a video type, a text document type, etc.
  • a second judging sub-module 14 for judging the data to be important data if it is determined that the data belongs to the prescribed data type.
  • If the current system environment is the second system, the storage control module 20 directly stores the data into the second system; if the current system environment is the first system and the data is important data, the storage control module 20 also stores the data into the second system. The storage control module 20 comprises:
  • a storage prompting sub-module 21 for generating a storing prompt that suggests a user to store the data into the second system if it is judged that the data is important data. The storing prompt can be implemented by using a text, a picture, an audio or a video to prompt the user that the data is important data and is suggested to be stored into the second system. Preferably, the storing prompt can be provided with a confirmation button and a cancel button, and after the user receives the storing prompt, the user may click on the confirmation button to send a confirmation instruction, and may also click on the cancel button to send a cancel instruction. If the cancel instruction is sent, the data is then directly stored into the first system.
  • an interface displaying sub-module 22 for displaying an authentication interface of the second system after receiving the confirmation instruction of storing the data into the second system. A password input box may be displayed on the authentication interface, so as to require the user to input a correct authentication password.
  • a storage control sub-module 23 for storing the data into the second system after correct authentication information is received by the authentication interface. Preferably, if the user has input a correct authentication password on the authentication interface, the authentication is successfully completed and then the data is stored into the second system. Of course, the user may also input a correct authentication gesture on the authentication interface to complete the authentication operation.
  • By means of the present invention, when two systems are running concurrently on a communication terminal, the user's important data can be quickly stored into the second system. If the user is currently in the second system, the data handled by the user is directly stored into the second system; if the user is currently in the open first system, the data is judged to determine whether it involves important data, and if it is the case, the user is prompted to store the data into the second system, so that secured storage of important data is quickly realized, thereby protecting personal important data information.
  • FIG. 3 is a flow chart of a dual-system-based data storage method of the present invention, which can be carried out by the data storage system 100 shown in FIG. 1 or FIG. 2, comprising the steps of:
  • Step S301, judging whether the data is important data when storing data in a first system.
  • Preferably, the data is analyzed to determine whether a prescribed keyword is included in the data, for example, the data is scanned to determine whether it involves a bank account, a password, a credential picture, a certificate photo, etc., and if the data includes any prescribed keyword, it is judged that the data is important data. Alternatively, the data is analyzed to determine whether the data belongs to a prescribed data type, in particular, the prescribed data type may be a picture type, a video type, a text document type, etc., and if the data belongs to the prescribed data type, it is judged that the data is important data.
  • Step S302, storing the data into a second system if it is judged that the data is important data.
  • For example, when a dual-system-based communication terminal processes and stores data such as a short message, a picture, a calendar, an audio recording, etc., firstly, the system environment that the user is currently in is judged, if the user is currently in the second system, the data processed in the second system is then directly stored into the second system; if the user is currently in the open first system, the data that is prepared to be stored is then judged according to a preset rule (i.e., keyword characteristic) to determine whether it is important data, and if the data is judged to be important data, it is then stored into the second system. Once the data is stored into the second system, the user would not be able to access or handle the data in the system environment of the first system, and therefore the security of important data is ensured. Preferably, the data stored in the second system can be imported into the first system in an encrypted backup form, and the user needs to know a correct password in order to retrieve the data.
  • FIG. 4 is a flow chart of a dual-system-based data storage method of a preferable embodiment of the present invention, which can be carried out by the data storage system 100 shown in FIG. 2, comprising the steps of:
  • Step S400, processing data when two operating systems are running concurrently.
  • Step S401, judging the current system environment when storing the data. Said system environment may be a first system or a second system.
  • Step S402, if the system environment is the second system, directly storing the data into the second system.
  • Step S403, if the current system environment is the first system, judging whether the data is important data. If the data is judged to be important data, Step S405 is executed; otherwise, Step S404 is executed.
  • Preferably, the data is analyzed to determine whether a prescribed keyword is included in the data, for example, the data is scanned to determine whether it involves a bank account, a password, a credential picture, a certificate photo, etc., and if the data includes any prescribed keyword, it is judged that the data is important data. Alternatively, the data is analyzed to determine whether the data belongs to a prescribed data type, in particular, the prescribed data type may be a picture type, a video type, a text document type, etc., and if the data belongs to the prescribed data type, it is judged that the data is important data.
  • Step S404, if it is judged that the data is not important data, storing the data into the first system.
  • Step S405, if it is judged that the data is important data, generating a storing prompt that suggests the user to store the data into the second system.
  • The storing prompt can be implemented by using a text, a picture, an audio or a video to prompt the user that the data is important data and is suggested to be stored into the second system.
  • Step S406, judging whether a confirmation instruction of storing the data into the second system is received. If it is the case, Step S407 is executed; otherwise, Step S404 is executed.
  • Preferably, the storing prompt can be provided with a confirmation button and a cancel button, and after the user receives the storing prompt, the user may click on the confirmation button to send a confirmation instruction, and may also click on the cancel button to send a cancel instruction. If the cancel instruction is sent, the data is then directly stored into the first system.
  • Step S407, displaying an authentication interface of the second system after receiving a confirmation instruction of storing the data into the second system.
  • A password input box may be displayed on the authentication interface, so as to require the user to input a correct authentication password.
  • Step S408, judging whether correct authentication information is received by the authentication interface. If it is the case, Step S409 is executed; otherwise, Step S410 is executed.
  • Step S409, storing the data into the second system after correct authentication information is received by the authentication interface.
  • Preferably, if the user has input a correct authentication password on the authentication interface, the authentication is successfully completed and then the data is stored into the second system. Of course, the user may also input a correct authentication gesture on the authentication interface to complete the authentication operation.
  • Step S410, if no correct authentication information is received by the authentication interface, prompting authentication error. Then the data is stored into the first system by default.
  • FIGS. 5A-5C are operation interface views of the dual-system-based data storage method of a preferable embodiment of the present invention. When a user stores data such as a text document, an audio recording, a picture, a short message or a calendar in a communication terminal, the system environment that the user is currently in is judged, if the current system environment is the second system, the data such as the text document, the audio recording, the picture, the short message or the calendar is then directly stored into the second system, and the user can only access and handle this data in the second system; if the current system environment is the first system, the data is then judged to determine whether it involves a prescribed keyword such as a bank account, a password, a credential picture or a certificate photo, and if it is the case, the data is then judged to be important data. As shown in FIG. 5A, when a scanned ID (Identification) card picture is generated after a user scans an ID card, the system recognizes that this scanned ID card prescribed keyword includes the prescribed keyword of an ID card number corresponding to the ID card, and prompts the user that this data involves privacy information if credentials and that it is suggested to save this data into the second system, as shown in FIG. 5B, if the user clicks on the OK button, it means the user agrees to save the data into the second system; if the user clicks on the Cancel button, the data is then stored into the first system. If the user clicks on the OK button, a password authentication interface for the second system is then popped, as shown in FIG. 5C, which prompts the user to input an authentication password for the second system in the password input box, and if the user has input a correct authentication password, the data is then automatically stored into the second system.
  • FIG. 6 is a structural schematic diagram of a terminal for dual-system-based data storage of the present invention. As shown in FIG. 6, the terminal for dual-system-based data storage comprises a communication bus 600, a transceiver 601, a memory 602 and a processor 603 (the data storage terminal may have one or more processors 603, and FIG. 6 shows one processor for example), wherein:
  • The communication bus 600 communicably interconnects the transceiver 601, the memory 602 and the processor 603.
  • The processor 603 stores program codes, and execution of the program codes by the processor 603 causes the processor 603 to perform the following operation steps:
  • the processor 603 judges whether the data is important data when storing data in a first system;
  • the processor 603 stores the data into a second system if it is judged that the data is important data.
  • Preferably, before the processor 603 judges whether the data is important data when storing data in the first system, the processor 603 is also caused to perform the following operation steps:
  • judging the current system environment when storing the data;
  • judge whether the data is important data according to a preset rule if it is judged that the current system environment is the first system;
  • directly store the data into the second system if it is judged that the current system environment is the second system.
  • Preferably, the processor 603 judging whether the data is important data comprises:
  • analyzing the data to determine whether a prescribed keyword is included in the data; and
  • judging the data to be important data if it is determined that the prescribed keyword is included in the data.
  • Preferably, the processor 603 storing the data into a second system if it is judged that the data is important data comprises:
  • generating a storing prompt by means of the transceiver 601 that suggests the user to store the data into the second system if it is judged that the data is important data;
  • displaying an authentication interface of the second system after the transceiver 601 receives a confirmation instruction of storing the data into the second system; and
  • storing the data into the second system after correct authentication information is received by the authentication interface.
  • To sum up, by means of a communication terminal of the present invention, with two systems running concurrently, when a user handles and stores data in the first system, if it is judged that the data is important data, said data is stored into the second system; and if the user handles and stores data in the second system, said data is stored directly into the second system. As a result, in a dual-system environment, the present invention can store the important data handled by the user in the first system into a second system quickly and conveniently, thereby sufficiently protecting information security for the user.
  • Apparently, the present invention may also have various other embodiments, and under the condition of not deviating from the concept and essence of the present invention, those familiar with the art can make various changes and modifications on the basis of the present invention, and these corresponding changes and modifications should be embraced in the protection scope defined by the appended claims of the present invention.

Claims (17)

1. A dual-system-based data storage method, wherein, comprising the steps of
judging whether the data is important data when storing data in a first system; and
storing the data into a second system if it is judged that the data is important data.
2. The dual-system-based data storage method of claim 1, wherein, switch entries are provided for the first system and the second system, the second system can be entered from the first system after receiving a correct password, and the first system can be entered from the second system without password.
3. The dual-system-based data storage method of claim 1, wherein, the data stored in the second system can be imported into the first system in an encrypted backup form.
4. The dual-system-based data storage method of claim 1, wherein, the second system is a non-open operating system.
5. The dual-system-based data storage method of claim 1, wherein, before judging whether the data is important data when storing data in the first system, the method further comprises
judging the current system environment when storing the data;
directly storing the data into the second system if it is judged that the current system environment is the second system, or
performing the step of judging whether the data is important data if it is judged that the current system environment is the first system.
6. The dual-system-based data storage method of claim 1, wherein, the step of judging whether the data is important data comprises
analyzing the data to determine whether a prescribed keyword is included in the data; and
judging the data to be important data if it is determined that the prescribed keyword is included in the data.
7. The dual-system-based data storage method of claim 1, wherein, the step of judging whether the data is important data comprises
analyzing the data to determine whether the data belongs to a prescribed data type; and
judging the data to be important data if it is determined that the data belongs to the prescribed data type.
8. The dual-system-based data storage method of claim 1, wherein, the step of storing the data into a second system if it is judged that the data is important data comprises
generating a storing prompt that suggests a user to store the data into the second system if it is judged that the data is important data;
displaying an authentication interface of the second system after receiving a confirmation instruction of storing the data into the second system; and
storing the data into the second system after correct authentication information is received by the authentication interface.
9. The dual-system-based data storage method of claim 8, wherein, after generating the storing prompt, sending a command to store the data into the first system according to a received cancel instruction for cancelling storing the data into the second system.
10. The dual-system-based data storage method of claim 8, wherein, sending a command to store the data into the first system after incorrect authentication information is received by the authentication interface.
11. A terminal for dual-system-based data storage, wherein, comprising a communication bus, a transceiver, a memory and a processor, wherein, the communication bus communicably interconnects the transceiver, the memory and the processor, the processor stores program codes, and execution of the program codes by the processor causes the processor to
judge whether the data is important data when storing data in a first system; and
store the data into a second system if it is judged that the data is important data.
12. The terminal of claim 11, wherein, before judging whether the data is important data when storing data in the first system, the processor is further caused to
judge the current system environment when storing the data;
judge whether the data is important data according to a preset rule if it is judged that the current system environment is the first system;
directly store the data into the second system if it is judged that the current system environment is the second system.
13. The terminal of claim 11, wherein, said judging whether the data is important data comprises
analyzing the data to determine whether a prescribed keyword is included in the data; and
judging the data to be important data if it is determined that the prescribed keyword is included in the data.
14. The terminal of claim 11, wherein, said judging whether the data is important data comprises
analyzing the data to determine whether the data belongs to a prescribed data type; and
judging the data to be important data if it is determined that the data belongs to the prescribed data type.
15. The terminal of claim 11, wherein, said storing the data into a second system if it is judged that the data is important data comprises
generating a storing prompt that suggests a user to store the data into the second system if it is judged that the data is important data;
displaying an authentication interface of the second system after receiving a confirmation instruction of storing the data into the second system; and
storing the data into the second system after correct authentication information is received by the authentication interface.
16. The terminal of claims 15, wherein, after generating the storing prompt, the processor is further caused to send a command to store the data into the first system according to a received cancel instruction for cancelling storing the data into the second system.
17. The terminal of claims 15, wherein, the processor is further caused to send a command to store the data into the first system after incorrect authentication information is received by the authentication interface.
US15/495,015 2014-10-24 2017-06-26 Dual-system-based data storage method and terminal Active US10204061B2 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN201410578085.1 2014-10-24
CN201410578085 2014-10-24
CN201410578085.1A CN104331667B (en) 2014-10-24 2014-10-24 Data save method based on dual system and system
PCT/CN2015/085886 WO2016062149A1 (en) 2014-10-24 2015-07-31 Dual-system-based data storage method and system

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/085886 Continuation WO2016062149A1 (en) 2014-10-24 2015-07-31 Dual-system-based data storage method and system

Publications (2)

Publication Number Publication Date
US20170286321A1 true US20170286321A1 (en) 2017-10-05
US10204061B2 US10204061B2 (en) 2019-02-12

Family

ID=52406389

Family Applications (1)

Application Number Title Priority Date Filing Date
US15/495,015 Active US10204061B2 (en) 2014-10-24 2017-06-26 Dual-system-based data storage method and terminal

Country Status (3)

Country Link
US (1) US10204061B2 (en)
CN (1) CN104331667B (en)
WO (1) WO2016062149A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021233351A1 (en) * 2020-05-19 2021-11-25 中兴通讯股份有限公司 Data transfer method and device, and terminal and computer-readable storage medium

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104331667B (en) 2014-10-24 2018-10-26 宇龙计算机通信科技(深圳)有限公司 Data save method based on dual system and system
CN106034117A (en) * 2015-03-13 2016-10-19 深圳酷派技术有限公司 Method and device for shifting content between systems and intelligent terminal
CN105516947A (en) * 2016-01-28 2016-04-20 宇龙计算机通信科技(深圳)有限公司 Message receiving method and system for mobile terminal
CN105791567B (en) * 2016-02-29 2019-05-14 宇龙计算机通信科技(深圳)有限公司 A kind of information storage means and multisystem mobile terminal
CN105721510A (en) * 2016-04-29 2016-06-29 宇龙计算机通信科技(深圳)有限公司 Account login method and terminal device
CN105912954A (en) * 2016-05-16 2016-08-31 北京珠穆朗玛移动通信有限公司 Privacy information protection method and system suitable for mobile terminal
CN106021125B (en) * 2016-05-16 2019-07-02 北京珠穆朗玛移动通信有限公司 Data sharing method, mobile terminal and its system between dual user system
CN106228081A (en) * 2016-07-11 2016-12-14 深圳市金立通信设备有限公司 A kind of information storage means based on dual system and terminal
CN106445707A (en) * 2016-10-12 2017-02-22 北京元心科技有限公司 Method and device for sharing data of multisystem clipboard

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080046997A1 (en) * 2006-08-21 2008-02-21 Guardtec Industries, Llc Data safe box enforced by a storage device controller on a per-region basis for improved computer security
CN101685484A (en) * 2008-09-27 2010-03-31 联想(北京)有限公司 Computer and data exchange method of operating system thereof
US8745365B2 (en) * 2009-08-06 2014-06-03 Imation Corp. Method and system for secure booting a computer by booting a first operating system from a secure peripheral device and launching a second operating system stored a secure area in the secure peripheral device on the first operating system
WO2011051757A1 (en) * 2009-10-26 2011-05-05 Gmx Sas Transactor for use in connection with transactions involving secure and non-secure information
US8949929B2 (en) * 2011-08-10 2015-02-03 Qualcomm Incorporated Method and apparatus for providing a secure virtual environment on a mobile device
CN103975332B (en) * 2011-12-08 2018-08-14 英特尔公司 For using hardware based root of trust to carry out the shared method and apparatus of the content based on strategy with Peer
KR20130093806A (en) * 2012-01-10 2013-08-23 한국전자통신연구원 System for notifying access of individual information and method thereof
CN102624699B (en) * 2012-01-19 2015-07-08 歌尔声学股份有限公司 Method and system for protecting data
US9310926B2 (en) * 2013-01-08 2016-04-12 Samsung Electronics Co., Ltd. Touch event processing methods and apparatus for portable device with multiple operating systems
US9177165B2 (en) * 2013-03-31 2015-11-03 Noam Camiel System and method for a secure environment that authenticates secure data handling to the user
CN103246850A (en) * 2013-05-23 2013-08-14 福建伊时代信息科技股份有限公司 Method and device for processing file
CN103391374B (en) * 2013-08-08 2015-07-08 北京邮电大学 Dual system terminal supporting seamless switching
CN103413089B (en) * 2013-08-28 2016-12-28 天翼电信终端有限公司 Mobile terminal and the method realizing dual system thereof
CN103413102A (en) * 2013-08-30 2013-11-27 深圳市中兴移动通信有限公司 Secret data management device and secret data management method as well as mobile terminal
CN103458125B (en) * 2013-09-06 2015-10-28 叶鼎 The guard method of a kind of high-grade privacy smart phone and private information thereof
CN104091135A (en) * 2014-02-24 2014-10-08 电子科技大学 Intelligent terminal safety system and safety storage method
CN105528306B (en) * 2014-09-28 2019-01-25 宇龙计算机通信科技(深圳)有限公司 A kind of data read-write method and dual system termi-nal of dual system termi-nal
CN104331667B (en) * 2014-10-24 2018-10-26 宇龙计算机通信科技(深圳)有限公司 Data save method based on dual system and system
DE102016105936A1 (en) * 2015-12-14 2017-06-14 Lenovo (Beijing) Limited Electronic device and method for running applications in different security environments

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Camiel US 2014/0338004 A1 *
EOM et al US 2013/0179495 A1 *
Kelly et al US 2013/0042295 A1 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021233351A1 (en) * 2020-05-19 2021-11-25 中兴通讯股份有限公司 Data transfer method and device, and terminal and computer-readable storage medium

Also Published As

Publication number Publication date
US10204061B2 (en) 2019-02-12
WO2016062149A1 (en) 2016-04-28
CN104331667A (en) 2015-02-04
CN104331667B (en) 2018-10-26

Similar Documents

Publication Publication Date Title
US10204061B2 (en) Dual-system-based data storage method and terminal
US10984114B2 (en) Document processing method and apparatus
US11030287B2 (en) User-behavior-based adaptive authentication
CN103235903B (en) A kind of mobile terminal concealing program disposal route and device
US10445487B2 (en) Methods and apparatus for authentication of joint account login
EP3147768B1 (en) Screen interface unlocking method and screen interface unlocking device
US20170161500A1 (en) Application security protection method, terminal, and storage medium
EP2893681B1 (en) Securely handling server certificate errors in synchronization communication
CN101916348A (en) Method and system for safely guiding operating system of user
US9355244B2 (en) Systems and methods for password reset
WO2015096411A1 (en) Systems and methods for password reset
CN103813334A (en) Right control method and right control device
US9553855B2 (en) Storing a key to an encrypted file in kernel memory
US20210266171A1 (en) Method and system for operating internet of things device
CN111800273B (en) Information processing method, electronic device, and storage medium
CN111866885A (en) Verification information sharing method and device and electronic equipment
US20150227733A1 (en) Automatic login system and automatic login method
CN105577619B (en) Client login method, client and system
CN111581665B (en) Data processing method and device and electronic equipment
CN113630253A (en) Login method, device, computer system and readable storage medium
CN105635041A (en) Integration registration system and method on the basis of face identification
CN111428222A (en) Gesture control method and device of mobile terminal, mobile terminal and storage medium
CN116743496A (en) Device remote operation method, device, computer device and storage medium
US10623956B2 (en) Request for network credential
US20110017821A1 (en) Access to a remote machine from a local machine via smart card

Legal Events

Date Code Title Description
AS Assignment

Owner name: YULONG COMPUTER TELECOMMUNICATION SCIENTIFIC (SHEN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:LIAN, SHUANG;REEL/FRAME:042523/0823

Effective date: 20140424

STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4